Let’s see how SentinelOne handles a ransomware attack!
Let’s see how the C# programming language can be used to hack Windows systems!
Let’s see how UUIDs can be used to execute shellcode on Windows systems!
Let’s see the importance of encryption by taking a look at HTTPS!
Let’s see how Amazon Web Services (AWS) can be hacked using the Pacu tool!
Let’s see how a custom C++ reverse shell works using the Visual Studio debugger.
Let’s see how Instaloader can be used to download Instagram profiles!
Let’s see how a WordPress site can be exploited using the WPScan tool!
Let’s take a look at the Malware Zoo and see how the WannaCry ransomware infects systems!
Let’s see how ZPhisher can be used to collect usernames and passwords for commonly used websites!
Let’s see how the latest privilege escalation vulnerability works on Linux, and how it can be exploited!
Let’s see how SprayKatz can be used to get password hashes off a Windows system!
Let’s discuss Microsoft’s choice to deprecate WMIC.exe in regards to lateral movement
Let’s see how we can send a malicious payload through a Microsoft Excel document using macros!
Let’s see how Metasploit can generate encrypted shellcode that we can use in custom payloads!
Let’s see whether it’s possible to run Metasploit on the iSH app on iPhone!
Let’s see how to perform the latest privilege escalation exploit on Linux to gain root access!
Let’s see how to gain situational awareness of Windows environments by taking a look at three useful tools!
See how you can use Kali on the go using NetHunter Rootless!
Interested in the cybersecurity field as a career? Take a listen on our thoughts about the field!
Get a high level explanation about the Log4J vulnerability and see how it can be exploited!
Let’s see how we can establish command and control of an iPhone using Empire!
See how to initiate a vulnerability scan using Nessus Vulnerability Scanner!
See how you can control a Tesla vehicle using Python and TeslaPy!
Let’s see how Windows 11 fairs against modern hacking techniques!
Let's see the setup process of the Raspberry Pi Zero W and how we can use it to scan our home WiFi networks using NMap!
See how you can get a reverse shell on the iPhone using netcat and the iSH app!